Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Xidian University(Natural Science)
1001-2400
2002 Issue 3
Research on and the application of the metadata-driven model supporting flexibility
li qing shan ; chen ping ; zuo hua
..............page:319-323
Quantum calculations of tunneling resistance in single electron transistors
du lei ; zhuang zuo zuo
..............page:314-318
Key distribution for broadcast encryption
qu jin ; ge jian hua ; jiang ming
..............page:310-313,323
The problem of two-stage hybrid flowshop research
niu hai jun ; sun shu dong
..............page:305-309
Modeling of IC integral profit optimization based on the products' optimal class
jing ming e ; wang yu ping ; hao yue
..............page:300-304
A study of the active vibration and shock control system for miniature hard disk drivers
jia jian yuan ; zhao zhong lei ; kang chun xia ; feng xiao ping
..............page:296-299
The light scattering of complex background radiation incident to target
wu zhen sen ; liu an an
..............page:289-293
An approach to improving the scoring precision of the automatic scoring system for shooting sports
zhang jian bo ; lu chao yang ; gao xi quan ; ding yu mei
..............page:324-327,342
Performance research on mobile IP handoff
pei zuo ; li jian dong ; guo feng
..............page:328-332,354
Research on the feature interaction detection methods based on URN
liu yan ming ; ma yu xiang ; yi ke chu
..............page:333-337
Fast quantized belief propagation algorithm for iteratively decoding LDPC codes
he yu cheng ; sun shao hui ; mu jian jun ; wang xin mei
..............page:338-342
Embedded coding of images with regions of interest based on zerotree
chen jun ; wu cheng ke ; li yun song
..............page:343-346,374
A genetic algorithm based on the probability model
wang xi li ; liu fang ; jiao li cheng
..............page:347-350
Security architecture of the 3G mobile communications system
liu dong su ; wei bao dian ; wang xin mei ; ma wen ping
..............page:351-354
Estimation of pulse repetition intervals based on PRI transform
wang xing ying ; yang shao quan
..............page:355-359
FDTD analysis of an active integrated antenna
hu xiao juan ; zuo qing zuo
..............page:360-362,391
Design of adaptive observers based on the Hopfield network
zhang jie ; li jun min ; wang zuo
..............page:368-370
The status of attack on the discrete logarithm of elliptic curves
zhang fang guo ; chen xiao feng ; wang yu min
..............page:398-403
The prediction of the PIM amplitude and power by using the power series method
zhang shi quan ; ge de biao ; fu de min
..............page:404-407,425
New triangular microstrip antennas and analysis
dong yu liang ; yang xiao peng ; zhang shi xuan
..............page:408-410
Generation of frequency hopping sequencs with block cipher
li zan ; jin li jun ; chang yi lin
..............page:411-414
A control model of the slider-crank mechanism with a variable input speed
li tuan jie ; wen qun yan ; jiang er jin
..............page:415-418
Optimization design of the multi-bit phase quantizer
qu er guang ; yang shao quan
..............page:419-422
A smoothing method for solving the nonlinear complementarity problem
meng hong yun ; liu san yang
..............page:371-374
Optimality conditions for super efficient solutions in bilevel programming
fan li ya ; liu san yang
..............page:375-378
Triple I Method for Lukasiewiczs implication operator
gao xiao jun ; li jun min ; zhao dong yuan
..............page:379-381,397
Robust adaptive sliding mode iterative learning control based on the neural network
yang xiao jun ; li jun min
..............page:382-386
Mining fuzzy association rules in interval valued relational database
lu jian jiang ; song zi lin ; qian zu ping
..............page:387-391
Development of mobile Agent technology
lv yu hai ; xu xue zhou
..............page:392-397
Linear complexity profile of periodic sequences and its property
bai en jian ; zhang bin ; xiao guo zhen
..............page:423-425
The software implementation of the elliptic curve cryptosystem over large prime fields
wang zuo ; zhang fang guo ; wang yu min
..............page:426-428